The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Improved security of user identity is obtained with a computing system by using a small calculator as an intermediary between the user and computing system to prevent disclosure of all identifying data.
English (United States)
This text was extracted from a PDF file.
100% of the total text.
Page 1 of 1
User Identification Technique for Computer System
Improved security of user identity is obtained with a computing system by
using a small calculator as an intermediary between the user and computing
system to prevent disclosure of all identifying data.
For providing identification, the user carries a device that is
a small credit card type of calculator having a microprocessor,
keypad, read-only memory (ROM) and external interface. When
identification is required to a computing system, here designated an
agent, the following sequence occurs:
1. User connects the device interface to the agent;
2. Agent identifies itself to the device via the
3. The device confirms its connection and asks user for a
4. User enters the password to the device which compares
it with a stored password in ROM;
5. If correct, the device searches ROM for an appropriate
identification code representing user to agent;
6. The device transmits the code to agent where it is
accepted or rejected and terminates the session.
With this process, the user interacts only with the device and does not
present all identification to the agent, which may be unreliable. The identification
for one agent need not be valid for another. The device can be programmed to
accept a single or different passwords for several agents.